Continuous Security Monitoring, a Securosis white paper
Given that one can never get ahead of IT security threats, successful protection of critical data means effectively deterring—and then reacting faster to—attacks. Yet, a bulk of security spending goes toward outdated controls that do neither very well. The US Federal Government and others have finally "gained religion" about the importance of security monitoring, recognizing that point in time assessment is longer sufficient.
Learn what security monitoring (AKA Continuous Detection and Mitigation (CDM) and Continuous Monitoring (CM)) is, how to implement a risk-based approach to monitoring, and how to leverage security monitoring for change control and compliance programs. And why, regardless of the use case deployed initially, it’s wise to invest in a monitoring technology platform applicable to all the use cases, across your entire enterprise.